Data Protection During the holidays

Key with christmas tree

The Holiday season is upon us, and most people will spend significantly more time traveling over the next month than they did for the rest of the year. The hours spent in airports on the way to visit family, friends, and loved ones, as well as massive increases in online shopping, both ramp up the [...] Read more »

A Report from the Front

whos winning the cyber war

Bad news this week, as the accounting branch of Ernst & Young has recently released their 16th annual Global Information Security Survey for 2013. The report showcases the increasing incidence, virulence, and complexity of cyber threats throughout the IT sector, as well as highlighting a deceleration in the development of affordable and effective countermeasures that [...] Read more »

NIST Revisited

NIST cybersecurity risk

Last week, we reported on the effects of the government shutdown on the National Institute of Standards and Technology – the federal agency tasked with building the framework for the President’s cybersecurity initiative – and how closing down the NIST and furloughing its employees was not only irresponsible, but defied the rules laid out in [...] Read more »

Will the Government Shutdown Increase the Risk of Cyber Attacks?

NIST shutdown increases cyber risk

Regardless of your preferred political stance, the government shutdown that resulted from the duel in Congress over the Affordable Care Act has created a potential calamity across the data protection sector. As of midnight on October 1st, the National Institute of Standards and Technology has furloughed employees and temporarily suspended operations until the budget crisis [...] Read more »

What To Do if your Small Business is Hacked

small business data security

CNN, PCWorld, and the Harvard Business Review have all published recent articles on the upward trend in hacker attacks against small businesses throughout the country. The shift from large corporate targets to smaller operations makes sense from the view of a cyber criminal: with more and more business data being stored locally by companies of [...] Read more »

The Battle for Taiwan

taiwan hacking

Chinese cyber attacks have been on the rise for years, and a new battleground is taking shape to the east that may offer valuable insights into the strategies and tactics of both the underground and state sponsored styles of online warfare emerging from the People’s Republic. Taiwan has been a focal point of Chinese hacking [...] Read more »

Crowdsourcing IT

crowdsourced IT

Tavis Ormandy, an engineer at Google, is dealing with blowback from a blog post he offered on Seclists.org in late May regarding an exploitable hole in the Windows operating system. Tavis’s post was well thought out and informative – he clearly identified the hole, expressed concern over potential abuse by nefarious agencies, and offered a [...] Read more »

Breaching the Citadel

MicroSoft is on the warpath, and the target is the Citadel Botnet. A loosely connected global network of computers hijacked by cyber criminals and used to commit crimes, the Citadel has been something of an urban legend for years. Granted, the idea of a shadowy group of hackers implanting malicious instructions into millions of computers [...] Read more »

First Generation Android Virus Discovered

An interesting development in the mobile device world is developing, thanks to research performed by global anti-virus and software security company Symantec. It appears that the first of what will undoubtedly be many fake antivirus programs targeted at Android devices has been captured. The app – listed under the moniker “Android Defender” – is a [...] Read more »

HIMSS 2013 Shines a Light on Health Care Cybersecurity

The 2013 Healthcare Information and Management Systems Society (HIMSS) annual conference took place earlier this year in New Orleans, Louisiana, and while the content was tailored specifically for the health care industry, much of what was shared at this event can be folded into the strategies of data protection specialists across a broad range of [...] Read more »

Next Page »